Linux Privacy - Page 48
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A government watchdog group Wednesday accused the Justice Department of improperly censoring portions of a key report on internal workplace diversity, after online activists successfully unmasked the blacked-out portions of an electronic copy of the document. . .
It starts out innocently enough. You're browsing the Web, dreaming of the weekend and your next golf game, and you happen across a great-looking site that promises to drop your handicap in three easy lessons. Sounds good, but you've got . . .
Spam has become a real problem these days. The more people who know your e-mail address, the more unwanted pieces of mail you receive. If you used your e-mail to register on some Web sites or publish a few articles in . . .
Anti-spam activists have won an important legal battle against Florida-based junk mailers. But even though Florida Judge Donald M. Middlebrooks dismissed the case brought by eMarketersAmerica.org with prejudice (i.e. ruling that the lawsuit was without any foundation), anti-spam groups still . . .
With spam blocking companies trying to ward off the latest advances, spammers are making strenuous attempts to get around e-mail filters. Their latest ploy: Spam with subject lines that read ^G.et^ a BUL"KY 'PO;L`E or `Extend y:ou^r r;od` ^easy'. Say again? . . .
The relentless drive for more intrusive technology to help improve security may result in a society that is less secure, warned Al Gore, former vice president of the U.S., speaking Tuesday at the Carnahan Conference on Security Technology in Taipei.. . .
The report entitled "Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview" focuses on the potential threats to security and privacy of three particular technologies. They are identity management, such as on-line services that require . . .
Bulk emailers are digitally signing unsolicited messages in hopes of bypassing popular filtering programs, but updated software has been modified to detect the trick. The trick was noted on several security lists, as the number of junk email messages sporting . . .
Last month at the International Business Law Services (IBLS) Strategic Global Summit for E-Commerce, Pauline Reich, an associate professor at Waseda University School of Law in Tokyo, Japan, gave a speech entitled "Legal Issues: Internet and E-mail in the Workplace." Reich . . .
Call them spackers -- they're the new breed of computer crackers who earn a living in cahoots with spammers. The latest innovations developed by such mercenary hackers on behalf of the junk e-mail profession are techniques that enable spammers -- . . .
Spammers are becoming more intelligent and more difficult to detect, which is a strange issue, just because in my opinion, an intelligent person is smart enough for not bothering millions of people. So, why these people keep on helping unethical . . .
A high-profile digital civil liberties group is criticizing a component of the "trusted computing" technology promoted by Microsoft, IBM and other technology companies, calling the feature a threat to computer users.. . .
It is particularly difficult to bolt a single sign-on solution -- SSO, the ability to log in once and be authenticated to all your network resources -- onto existing applications, but every developer faces this problem when building sophisticated portals. Because . . .
I hate spam. You hate spam. We all hate spam. But none of us hate spam as much as ISPs and business network administrators do. Alexis Rosen, president and co-owner of Public Access Networks, which runs Panix, one of the oldest . . .
Andy Markley was really looking forward to a work-free Labor Day weekend far away from his computer. But he made the mistake of checking his inbox before he left for his planned holiday. Hundreds of e-mails greeted Markley that Saturday . . .
Britain Thursday became the second country in Europe to criminalize spam, the unwanted barrage of e-mail and mobile phone text messages promising riches, cheap home loans and a better sex life. The unsolicited messages, which industry groups say account for . . .
I have also used the time to learn more about identity theft and what I found is very scary. Identity theft is not only incredibly easy to do, but our government seems to go out of its way to help the thieves. The government is making many Americans more vulnerable, not less. This is crime just waiting to happen on a massive scale, thanks to computer technology.. . .
The government has declared that broadband Britain is to become reality by 2005, and that progress towards this target is being made quickly. Oftel, the UK telecoms watchdog, confirmed that the one million broadband connection landmark was reached in October . . .
A staggering 27.3 million Americans have been victims of identity theft in the last five years, according to Federal Trade Commission survey out this week. In the last year alone, 9.9 million people have had their identity purloined. Identity theft . . .
Where privacy is concerned, Americans distrust their government. But they'll gladly hand over their personal information to a corporation to get a deal on their groceries. Europeans, on the other hand, will give their government extremely broad surveillance powers, but they largely forbid private enterprise from accessing any personal data without their express written consent.. . .